One of the core competencies of the ENCRYPTO group is building tools that make efficient secure multi-party computation accessible to non-experts. We make our tools available as open source and they are used by several research groups and industry.
Awards
- 2017 CROSSING Collaboration Award: Daniel Demmler and Christian Weinert from the ENCRYPTO Group together with Felix Günther, Stefan Krüger, and Michael Reif won the CROSSING Collaboration Award 2017 for their joint paper “CogniCrypt: Supporting Developers in using Cryptography”.
- 2016 CROSSING Collaboration Award: Daniel Demmler and Michael Zohner from the ENCRYPTO Group together with Ghada Dessouky and Shaza Zeitouni won the CROSSING Collaboration Award 2016 for their joint research on tools for multi-party computation.
Publications (selection)
- N. Büscher, D. Demmler, S. Katzenbeisser, D. Kretzmer, T. Schneider. HyCC: Compilation of hybrid protocols for practical secure computation. In 25. ACM Conference on Computer and Communications Security (CCS'18), 2018. Code: https://gitlab.com/securityengineering/HyCC. Acceptance rate 16.6%. CORE rank A*.
- M. S. Riazi, C. Weinert, O. Tkachenko, E. M. Songhori, T. Schneider, F. Koushanfar. Chameleon: A hybrid secure computation framework for machine learning applications. In 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), 2018. Acceptance rate 16.8%. CORE rank B.
- G. Dessouky, F, Koushanfar, A.-R. Sadeghi, T. Schneider, S. Zeitouni, M. Zohner. Pushing the communication barrier in secure computation using lookup tables. In 24. Annual Network and Distributed System Security Symposium (NDSS'17), 2017. Acceptance rate 16.1%. CORE rank A*.
- D. Demmler, G. Dessouky, F. Koushanfar, A.-R. Sadeghi, T. Schneider, S. Zeitouni. Automated synthesis of optimized circuits for secure computation. In 22. ACM Conference on Computer and Communications Security (CCS'15), 2015. Acceptance rate 19.8%. CORE rank A*.
- E. M. Songhori, S. U. Hussain, A.-R. Sadeghi, T. Schneider, F. Koushanfar. TinyGarble: Highly compressed and scalable sequential garbled circuits. In 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), 2015. Acceptance rate 13.5%. CORE rank A*.
- D. Demmler, T. Schneider, M. Zohner. ABY – a framework for efficient mixed-protocol secure two-party computation. In 22. Annual Network and Distributed System Security Symposium (NDSS'15), 2015. Code: https://encrypto.de/code/ABY. Acceptance rate 18.4%. CORE rank A*.
- F. Kerschbaum, T. Schneider, A. Schröpfer. Automatic protocol selection in secure two-party computations. In 12. International Conference on Applied Cryptography and Network Security (ACNS'14), 2014. Acceptance rate 22.4%. CORE rank B.
- W. Henecka, T. Schneider. Faster secure two-party computation with less memory. In 8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), 2013. Code: https://encrypto.de/code/me-sfe. Acceptance rate 16.2% for full papers. CORE rank B.
- T. Schneider, M. Zohner. GMW vs. Yao? Efficient secure two-party computation with low depth circuits. In 17. International Conference on Financial Cryptography and Data Security (FC'13), 2013. Acceptance rate 12.5% for regular papers. CORE rank B.
- W. Henecka, S. Kögl, A.-R. Sadeghi, T. Schneider, I. Wehrenberg. TASTY: Tool for Automating Secure Two-partY computations. In 17. ACM Conference on Computer and Communications Security (CCS'10), 2010. Code: https://encrypto.de/code/TASTY. Acceptance rate 17.2%. CORE rank A*.